Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Identify 2 transport layer protocols?

A.) IP

B.) TCP

C.) CDP

D.) ARP

E.) UDP



Identify 2 transport layer protocols? A.) IP B.) TCP C.) CDP D.) ARP E.) UDP..

Answer / guest

Answer: B E

TPC and UDP are 2 layer4 Transport protocols.

Is This Answer Correct ?    4 Yes 1 No

Post New Answer

More CCNA Interview Questions

Which statement about the data link connection identifier (DLCI) is true? A. It is a number that identifies a local virtual circuit in a Frame Relay network B. It is a signaling standard between the CIDE device and the Frame Relay switch C. It is the clock speed (pod speed) of the connection (local loop) to the Frame Relay Cloud D. It is the Maximum number of uncommitted bits that the Frame Relay switch will attempt to transfer beyond the Committed Information Rate (CIP)

2 Answers  


At what layer of the OSI reference model does FRAME-RELAY map to? A.) Session B.) Physical C.) Network D.) Presentation E.) Transport F.) Datalink

2 Answers  


Identify the keystroke used to terminate the setup mode? A.) Ctrl-K B.) Crtl-C C.) Ctrl-Z D.) Crtl-End

2 Answers  


Identify the type of routing protocol that maintains a topological database of the network? A.) Topological state B.) Shortest Path First C.) Link state D.) Distance vector

1 Answers  


Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed

1 Answers   HCL,


what is the binary value of loop back address

13 Answers  


Which device listed below provides clocking for the line? A.) DCE B.) CPE C.) CO D.) DTE E.) Demarc

1 Answers  


Which protocol can do load balancing on unequal cost also?

0 Answers  


which defined peer ip address an local subnet belong to crete? (Choose two)

0 Answers  


8. When is Frame Tagging used? A. When you install repeaters in your network B. When you install bridges in your network C. When you install routers in your network D. When you use Switches configured with multiple VLANS

5 Answers  


The Datalink layer works with which of the following: A.) Packets B.) Bits C.) Globules D.) Frames E.) Segments

1 Answers  


Which of the following is true regarding standard ISDN BRI service? A.) ISDN BRI B channels are typically 64K. B.) ISDN BRI can handle only voice. C.) ISDN BRI can handle only data. D.) ISDN BRI has 2B and 1D channels. E.) ISDN BRI D channels are 16K. F.) ISDN BRI can handle voice and data.

2 Answers  


Categories